ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-76C3F8DCF3D0
|
Infrastructure Scan
ADDRESS: 0x8e1b4aa6f8a4cd937bd867052e1e7bf505900079
DEPLOYED: 2026-04-23 23:26:47
LAST_TX: 2026-04-24 00:10:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: D99BF073. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 1553 bytes. [SCAN] Identifying function signatures (0x317085e8). [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x7d analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task D99BF073 finished in 88s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x98efee815a6a3b19fa627dd5ae8f064e60e23451 0xa4831d1795bdeccd45a73edf72c334c6811cb026 0x80d5ce7b6b0294293616da1f0c6bcfce771bdeb7 0x82a474768120244909b5aa6af76523dfd3d6ae23 0x143eff707e66ea36a5726b55e7a0a9b76b217105 0xdfd4074d616686057307c1b3bf8458d90f0118f0 0xfee3eb2ae460e0f71d0bde23ae96e6d0129525d1 0x1a26b67c5d3e3e8b8c7f2f61a1f002bcb7a64b89 0x843158970ac3a0406cc9b3181b9ce53fcdc8beec 0x8bad27f724b3db616c0808e0be6d5d659389ec6c 0x8d0d597de0342b67c45429d2baf83679f7cba33e 0x8c6e8a60876b5e75a26a362c7b6de88cca468208 0x29b0b0e10a3ff77fca31b09f12e5a43439038d40 0x37c3cf809812ef406d433327e707a618d6209784 0x15912d5deaddd2d36d8b1145307a6bfd0721f1f9 0x372c072b6c4aad569a17160d0fea071d1477ba73 0xf78098605a69720befee6e07c70ff6d6c3d99d32 0xc565afcd9d138af3360c92ab9082d361e3e76151 0x47ad14b43bf99f881a92db4a7008efcbd3102dcd 0x31480efd56f0f5152dff80b90bc88552a7dd7ad8



Comments are closed